当前位置>主页 > 期刊在线 > 信息安全 >

信息安全2019年8期

基于位置服务的隐私保护综述
魏兴民,杜鹏懿
(中国赛宝实验室(工业和信息化部电子第五研究所),广东 广州 510610)

摘  要:随着社会的发展,技术快速进步,高精度的定位设备使得我们能够使用多种不同类型的基于位置服务(LBS)。这些设备获得的位置信息包括十分隐私的个人信息,所以隐私保护成了现在基于位置服务最重要的问题之一。本文总结了三种基于位置服务的隐私保护方法,包括使用仿真品的匿名通信技术,使用人造的仿真品位置信息,让服务提供者不能区分哪一个是真实的用户信息。点对点的空间隐形方法,用户使用自己的对等体作为代理,这些对等体将用户的查询消息转发给服务提供者,实现了空间隐形。空间和时间隐藏方法,是通过权衡空间分辨率和时间分辨率,来满足指定的匿名性要求。最后提出了自己的一些创新的研究思路和解决方案。


关键词:隐私保护;基于位置服务;匿名;点对点;空间隐藏;时间隐藏



中图分类号:TP309         文献标识码:A         文章编号:2096-4706(2019)08-0154-04


A Review of Privacy Protection for Location-based Services
WEI Xingmin,DU Pengyi
(CEPREI Laboratory of China (Fifth Institute of Electronics,Ministry of Industry and Information Technology),
Guangzhou 510610,China)

Abstract:With the development of society,technology advances rapidly,highly accurate positioning devices enable us to entertain many different types of location-based services (LBS). But location information obtained by these devices includes deeply personal information. Therefore,the protection of privacy has been one of the most significant issues of location-based services. This paper reviews three privacy protection methods for location-based services(LBS),including anonymous communication technique using dummies,this method use dummies together with real user information,so the service provider can’t distinguish which one is the real user information. Peer-to-Peer (P2P) spatial cloaking algorithm,in which user’s peers act as agents,they forward user’s queries to service provider,thus this method achieves spatial cloaking. Spatial and temporal cloaking method,in which spatial resolution and temporal resolution is traded off to meet specify anonymity requirement. Finally,this paper proposed some innovative research ideas and solutions.

Keywords:privacy protection;LBS;anonymity;P2P;spatial cloaking;temporal cloaking


参考文献:

[1] BERESFORD AR,STAJANO F.Location privacy in pervasive computing [J].IEEE Pervasive Computing,2003,2(1):46-55.

[2] Gruteser,M. and Grunwald,D.Anonymous Usage of Location-Based Services through Spatial and Temporal Cloaking [C]//Proceedings of the 1st International Conference on Mobile Systems,Applications and Services,San Francisco,2003.

[3] Kido H,Yanagisawa Y,Satoh T. Protection of Location Privacy using Dummies for Location-based Services [C]//International Conference on Data Engineering Workshops. IEEE Computer Society,2005.

[4] Chow C Y,Mokbel M F,Liu X. A peer-to-peer spatial cloaking algorithm for anonymous location-based service [C]//Acm International Symposium on Advances in Geographic Information Systems.ACM,2006.

[5] B.Gedik and L.Liu.A customizable k-anonymity model for protecting location privacy [C]//In Proc.IEEE ICDCS,2005.

[6] M. Gruteser and D. Grunwald. Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking [C]//ACM International Conference on Mobile Systems,Applications and Services,2003.

[7] Chi-Yin Chow,Mohamed F. Mokbel,Walid G. Aref. Casper*:Query processing for location services without compromising privacy [J].ACM Trans. Database Syst.,2009,34.

[8] Chow C Y,Hong V L,Chan A T S. Distributed group-based cooperative caching in a mobile broadcast environment [C]//International Conference on Mobile Data Management,2005.

[9] Papadopouli M,Schulzrinne H. Effects of  power conservation,wireless coverage and cooperation on data dissemination among mobile devices. In [C]//John Wiley & Sons,Ltd.,2001.

[10] Huang Z,Christian Søndergaard Jensen,Lu H,et al. Skyline Queries Against Mobile Lightweight Devices in MANETs [J].Icde,2006:66.

[11] Ku W S,Zimmermann R,Wang H,et al. ANNATTO:Adaptive Nearest Neighbor Queries in Travel Time Networks [C]//International Conference on Mobile Data Management. IEEE,2005.

[12] Pfitzmann A,MaritKöhntopp. Anonymity,Unobservability,and Pseudonymity — A Proposal for Terminology [J].2001.

[13] Reiter M K,Rubin A D. Crowds:anonymity for Web transactions [J].ACM Transactions on Information and System Security,1998,1(1):66-92.

[14] GOLDSCHLAG D,REED M,SYVERSON P,et al.Onion routing for anonymous and private internet connections [J].Communications of the ACM,1999,42(2):39-47.


作者简介:魏兴民(1984.02-),男,汉族,宁夏固原人,研究生,工程师,研究方向:信息安全。